US20150097958A1 - Smart-home security system with keypad device resistant to anomalous treatment - Google Patents
Smart-home security system with keypad device resistant to anomalous treatment Download PDFInfo
- Publication number
- US20150097958A1 US20150097958A1 US14/508,183 US201414508183A US2015097958A1 US 20150097958 A1 US20150097958 A1 US 20150097958A1 US 201414508183 A US201414508183 A US 201414508183A US 2015097958 A1 US2015097958 A1 US 2015097958A1
- Authority
- US
- United States
- Prior art keywords
- keypad device
- security keypad
- security
- data
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/06—Mechanical actuation by tampering with fastening
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F24—HEATING; RANGES; VENTILATING
- F24F—AIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
- F24F11/00—Control or safety arrangements
- F24F11/62—Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
- F24F11/63—Electronic processing
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05F—SYSTEMS FOR REGULATING ELECTRIC OR MAGNETIC VARIABLES
- G05F1/00—Automatic systems in which deviations of an electric quantity from one or more predetermined values are detected at the output of the system and fed back to a device within the system to restore the detected quantity to its predetermined value or values, i.e. retroactive systems
- G05F1/66—Regulating electric power
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/02—Monitoring continuously signalling or alarm systems
- G08B29/04—Monitoring of the detection circuits
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
- G08B3/10—Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2823—Reporting information sensed by appliance or service execution status of appliance services in a home automation network
- H04L12/2825—Reporting to a device located outside the home and the home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42202—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS] environmental sensors, e.g. for detecting temperature, luminosity, pressure, earthquakes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42204—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
- H04N21/42206—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor characterized by hardware details
- H04N21/42221—Transmission circuitry, e.g. infrared [IR] or radio frequency [RF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/4227—Providing Remote input by a user located remotely from the client device, e.g. at work
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/43615—Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/26—Pc applications
- G05B2219/2642—Domotique, domestic, home control, automation, smart house
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/284—Home automation networks characterised by the type of medium used
- H04L2012/2841—Wireless
Definitions
- the present invention generally relates to security system keypads. More specifically, the present invention relates to physical tampering detection for a security keypad.
- the keypad is an integral component of home security systems.
- the keypad functions as a user interface for a security system, providing controls for the operation of the security system and displaying output information from the security system. For example, a user can use the keypad to activate the security system when leaving home and to disable the system when the user returns.
- Keypads also include a display screen or indicator lights for communicating information to the user, such as the state of the security system.
- the keypad is connected to a control panel, which is also connected to the sensors of the system.
- the control panel performs the central processing functions for the security system. Readings from the sensors and user input received by the keypad are transmitted to the control panel for processing. When an intrusion is detected by the sensors, the control panel triggers the alarm response, which can include activating an audible alarm and transmitting a notification to authorities or users.
- a system for detecting tampering of a security keypad device includes the security keypad device and a computer server system.
- the computer server system is communicatively coupled to the security keypad device.
- the security keypad device includes a keypad, a high power wireless module, a low power wireless module, and a cellular module.
- the high power wireless module is configured to transmit and receive data wirelessly via a local area network.
- the low power wireless module while often transmitting and receiving data wirelessly via a personal area network at a lower rate of data transfer than the high power wireless module, nevertheless generally consumes less power than the high power wireless module.
- the cellular module is configured to transmit and receive data wirelessly via a wide area network.
- the security keypad device further includes a power cord configured to transfer power to the security keypad device from a primary power source, a battery compartment configured to hold a secondary power source, an active infrared (IR) position sensor and an accelerometer.
- the active IR position sensor comprises a light source configured to emit IR light and an IR sensor configured to detect reflected IR light.
- the active IR position sensor is configured to sense the position of the security keypad device based on detecting the reflected IR light.
- the accelerometer is configured to measure an acceleration force.
- the security keypad device further includes a processor configured to receive positional data from the active IR position sensor and acceleration data from the accelerometer.
- the processor determines that the position of the security keypad device changed based on the positional data or the acceleration data and transmits a tampering event to the computer server system in response to determining that the position of the security keypad device changed.
- the tampering event indicates that the security keypad device has been physically tampered with.
- the computer server system is configured to receive the tampering event and transmit the tampering event to a mobile device that is authorized to access the account associated with the security keypad device.
- a security keypad device for detecting tampering.
- the security keypad device includes a keypad, a high power wireless module, a low power wireless module, and a cellular module.
- the low power wireless module while often transmitting and receiving data wirelessly via a personal area network at a lower rate of data transfer than the high power wireless module, nevertheless generally consumes less power than the high power wireless module.
- the cellular module is configured to transmit and receive data wirelessly via a wide area network.
- the security keypad device further includes a horn, an active IR position sensor, an accelerometer, and a processor.
- the horn is configured to generate an audible alarm.
- the active IR position sensor comprises a light source configured to emit IR light and an IR sensor configured to detect reflected IR light.
- the active IR position sensor is configured to sense the position of the security keypad device based on detecting the reflected IR light.
- the accelerometer is configured to measure an acceleration force.
- the processor is configured to receive positional data from the active IR position sensor and acceleration data from the accelerometer.
- the processor determines that the position of the security keypad device changed based on the positional data or the acceleration data, determines whether the degree of change is sufficient to constitute an anomalous condition such as a tampering attempt, and activates the horn in response to determining the presence of the anomalous condition.
- the security keypad device may notify, via one or more of the cellular, high power wireless, and low power wireless communication modules, an external computing system (e.g., a remote cloud server) and/or a user's mobile device that an anomalous condition such as tampering has been detected.
- an external computing system e.g., a remote cloud server
- a security keypad device for detecting tampering.
- the security keypad device includes means for receiving user input of a code, means for communicating data wirelessly via a local area network at a relatively high rate of data transfer that consumes a relatively high amount of power, means for communicating data wirelessly via a personal area network at a relatively low rate of data transfer that consumes a relatively low amount of power, and means for communicating data wirelessly via a wide area network.
- the security keypad device further includes means for emitting infrared (IR) light, means for detecting reflected IR light, means for sensing a position of the security keypad device based on detecting the reflected IR light, and means for measuring an acceleration force on the security keypad device.
- the security keypad device also includes means for determining that the position of the security keypad device changed based on at least one of the sensed position and the measured acceleration force, and means for generating an audible alarm in response to determining that the position of the security keypad device changed.
- FIG. 1 is an example of a smart-home environment within which one embodiment of a system for detecting tampering of a security keypad device can be implemented.
- FIG. 2 is a network-level view of one embodiment of a system for detecting tampering of a security keypad device.
- FIG. 3 is an abstracted functional view of one embodiment of a system for detecting tampering of a security keypad device.
- FIG. 4 is a block diagram of an embodiment of a security keypad device for detecting tampering.
- FIG. 5 is a flowchart of one embodiment of a process for detecting tampering of a security keypad device.
- FIG. 6 is a block diagram of an exemplary environment for implementing one embodiment of a system for detecting tampering of a security keypad device.
- FIG. 7 is a block diagram of an embodiment of a special-purpose computer system for detecting tampering of a security keypad device.
- Security systems use a variety of different sensors to detect intruders for a home or enclosure. However, sensors are unable to discern the difference between an intruder and an occupant. To reduce false alarms that are triggered by the occupant, security systems provide a countdown when an intrusion is detected. The alarm will be triggered when the countdown reaches zero and the occupant must enter a code into the keypad before that happens to avoid a false alarm. Once the code is entered, the security system switches to a quiescent state so that the alarm will not be triggered by the occupant while the occupant is home.
- the keypad is typically located close to an entrance of the home and provides an indication of the countdown once an intrusion is detected.
- an intruder enters the home and sees the keypad often times the intruder will try to “smash and bash” the keypad to prevent the system from triggering the alarm.
- the control panel is integrated into the keypad. The intruder can effectively disable these systems if the keypad is destroyed before the countdown reaches zero.
- a security keypad device includes an active infrared (AIR) position sensor and an accelerometer.
- the AIR position sensor includes a light source that emits infrared light and an infrared sensor that detects reflected infrared light. The position of the security keypad device is determined based on the reflected infrared light that is detected.
- the accelerometer measures acceleration forces on the security keypad device. When the AIR position sensor or the accelerometer detects a change in the position of the security keypad device, an alarm is activated or a tampering event is transmitted to the user.
- FIG. 1 is an example of a smart-home environment 100 within which one embodiment of a system for detecting tampering of a security keypad device can be implemented.
- the depicted smart-home environment 100 includes an enclosure 150 , which can be, e.g., a house, office building, hotel, retail store, garage, or mobile home.
- the system can also be implemented in a smart-home environment 100 that does not include an entire enclosure 150 , such as an apartment, condominium, or office space.
- the depicted enclosure 150 includes a plurality of rooms 152 , separated at least partly from each other via walls 154 .
- the walls 154 can include interior walls or exterior walls.
- Each room can further include a floor 156 and a ceiling 158 .
- Devices can be mounted on, integrated with and/or supported by a wall 154 , floor 156 or ceiling 158 .
- the smart home environment can include devices outside of the actual enclosure 150 , such as a pool heater or irrigation system.
- the smart-home environment 100 includes a plurality of intelligent, multi-sensing, network-connected devices (hereinafter referred to as “the smart devices”) that can integrate seamlessly with each other and with a computer server system 164 , such as a cloud-computing system.
- the smart devices can integrate seamlessly with each other and with a computer server system 164 , such as a cloud-computing system.
- the smart devices can include smart thermostats 102 , smart hazard detectors 104 , smart entryway devices 106 (e.g., doorbells or intercoms), smart wall switches 108 , smart wall plug interfaces 110 , and smart appliances 112 , such as refrigerators, stoves and/or ovens, televisions, washers, dryers, lights, stereos, intercom systems, garage-door openers, floor fans, ceiling fans, wall air conditioners, pool heaters, irrigation systems, security systems, and so forth.
- the smart-home environment 100 also includes a smart security keypad 114 and a smart video camera 116 .
- any of the smart devices in the smart-home environment can include any number of sensors.
- smart appliances 112 can include sensors that detect when they are being used.
- a motion or occupancy sensor such as an ultrasonic, passive infrared (PIR), or optical sensor, can be included in any of the smart devices to detect movement and activity.
- PIR passive infrared
- Some smart devices will also have sensors specific to the device.
- a smart light can include an ambient light sensor, such as a photoresistor or a single-pixel sensor that measures light in the room.
- Smart hazard detectors 104 can include smoke/fire/heat sensors, carbon monoxide/dioxide sensors, radon gas detectors, ambient light sensors, temperature sensors, humidity sensors, and the like.
- Any smart device can also include a processor for processing data from the sensors or other devices.
- Each smart device is also equipped with communications ports or transceivers for communicating data with other smart devices.
- the devices establish a mesh network for communication between devices.
- the devices can connect, via a router or gateway 160 , to a private network or the internet 162 , including any computer server system 164 and computing device that is connected to the same network.
- the required data communications can be carried out using one or more of a variety of custom or standard wireless protocols (e.g., cellular, 3G/4G, Wi-Fi, ZigBee, 6LoWPAN, BLE, etc.) and/or any of a variety of custom or standard wired protocols (CAT6 Ethernet, HomePlug, etc.).
- Thread protocol which is promulgated by the Thread Group and based on 802.15.4, IETF IPv6, and 6LoWPAN.
- devices that are powered by the household mains current can be provided with a combination of Wi-Fi, which can be relatively power-intensive, along with one or more lower-power protocols such as Thread and/or BLE.
- devices that are power-constrained in that they are not powered by the household mains current and do not have access to a high-capacity battery source are provided only with one or more low-power protocols such as Thread and/or BLE.
- devices that are not powered by the household mains current, but do have access to a reasonably high-capacity battery source, can be provided with a combination of Wi-Fi and one or more lower-power protocols such as Thread and/or BLE, with the Wi-Fi communications being controlled to be temporally restricted, such as being turned on only during brief periodic time intervals (e.g., once per day to upload logs and receive updates from the cloud), during particular device-sensed events, or when the user has physically actuated the device such as by pressing a button on the device.
- a combination of Wi-Fi and one or more lower-power protocols such as Thread and/or BLE
- one or more of the smart devices can further allow a user to interact with the device even if the user is not proximate to the device.
- a user can communicate with a device using a computer (e.g., a desktop computer) or mobile device (e.g., a smartphone, laptop computer, or tablet) 166 .
- a webpage or native mobile app can be configured to receive input from the user and control the device based on the input.
- the webpage or mobile app can also present information about the device's operation to the user.
- the user can view the status of a smart hazard detector or a history of notifications generated by the smart hazard detector.
- the user can be in the enclosure during this remote communication or outside the enclosure.
- smart security keypad 114 includes one or more AIR position sensors and an accelerometer sensor.
- Security keypad 114 is a detached device that is not mounted to the enclosure 150 and can be located anywhere in the home. In this embodiment, security keypad 114 is located by the front entrance of the home so that the sensors can detect people coming in to the home. This location also allows a user to quickly reach the keypad and enter the code after entering the home.
- Security keypad 114 can be disguised to look like other objects that are commonly found in a home, such as decorative or ornamental pieces.
- the casing that contains the various components of security keypad 116 is shaped to resemble a vase or candle holder. The casing disguises security keypad 114 from intruders that are not familiar with the device.
- Video camera 116 includes an image sensor for capturing image frames and is aimed at security keypad 114 .
- video camera 116 can detect a change in the positioning of objects that are in the viewing area.
- the processor of video camera 116 can be configured to compare two image frames captured at different points in time to detect position changes. If video camera 116 detects a change in the position of security keypad 114 , a short video clip, such as 30 seconds, of the position change recording is transmitted to computer server system 164 . The user can then view the clip from a computer or mobile device.
- Security keypad 114 and video camera 116 can also upload text logs to computer server system 164 , which can then be accessed by users.
- the smart keypad 114 , video camera 116 , or other smart devices in the home are capable of assigning user-defined gestures to actions or sets of actions.
- the user can program the smart keypad 114 with a panic gesture that causes the smart keypad 114 , other devices in the smart home, or the computer server system 164 to notify authorities, such as by calling or otherwise notifying a medical or police emergency response unit.
- a panic gesture can be, for example, the user quickly waving his or her hands in the air.
- the user can also program the smart keypad 114 or other smart devices in the home with an audible panic command. For example, when the user yells “help”, then the medical or police emergency response unit can be called or otherwise notified.
- the smart keypad 114 can include a panic button that the user can press to call the police or medical emergency response unit.
- FIG. 2 is a network-level view of one embodiment of a system 200 for detecting tampering of a security keypad device.
- System 200 includes computer server system 164 .
- Smart devices can communicate with the computer server system 164 via a private network or the internet 162 .
- Smart devices can transmit home data 202 , including user data and user activity data, to computer server system 164 for processing or storage. More specifically, home data 202 can include power consumption data, occupancy data, HVAC settings and usage data, carbon monoxide levels data, carbon dioxide levels data, volatile organic compounds levels data, sleeping schedule data, cooking schedule data, inside and outside temperature humidity data, television viewership data, inside and outside noise level data, video recording data, smart devices' log data, etc.
- the computer server system 164 can further provide one or more services 204 .
- the services 204 can include security monitoring, software updates, customer support, sensor data collection/logging, remote access, remote or distributed control, or use suggestions (e.g., based on collected home data 202 to improve performance, reduce utility cost, etc.).
- users can register the smart devices in their home or enclosure with the computer server system 164 .
- Computer server system 164 can associate the smart devices with an account during the registration process.
- the account can be user specific or specific to a home or enclosure that includes multiple users, and a unique identification of each smart device can be stored in the account.
- the user's mobile device or other computing device can also be associated with the account during registration.
- one or more username and password is associated with the account during registration.
- the user can then use the username and password to login on the mobile or computing device, and computer server system 164 can use the account to authorize the user's mobile or computing device for the services 204 .
- Data associated with the services 204 can be stored at the computer server system 164 .
- System 200 includes a processing engine 206 , which can be concentrated at a single server or distributed among several different computing entities without limitation.
- a single server can also include multiple engines for performing different processing tasks.
- the processing engine 206 can receive data from smart devices, index and store the data, or process the data to generate customized notifications or statistics.
- the processed data can be stored as derived home data 208 . Results of the processing can be transmitted back to the device that provided the home data, to other devices, to a server providing a webpage to a user of the device, or to other non-device entities.
- intrusion and tampering notifications can be generated by the processing engine 206 and transmitted to a user device via the Internet 162 .
- the processing engine 206 can be configured and programmed to derive a variety of useful information from the home data 202 .
- system 200 provides application programming interfaces (APIs) 210 to third parties, such as charities 222 , governmental entities 224 (e.g., emergency response units such as a fire department or police department, the Food and Drug Administration, or the Environmental Protection Agency), academic institutions 226 (e.g., university researchers), businesses 228 (e.g., security or fire monitoring service providers, social network providers, device warranty or equipment service providers, or providers of targeted advertisements based on home data), utility companies 230 , and other third parties.
- APIs application programming interfaces
- the APIs 210 permit third-party systems to communicate with the computer server system 164 , providing access to the services 204 , the processing engine 206 , the home data 202 , and the derived home data 208 . This allows third-party applications to submit specific data processing tasks to the computer server system 164 and receive dynamic updates to the home data 202 and the derived home data 208 . For example, a police department or security monitoring service provider can develop applications using the APIs 210 to provide emergency response services to users.
- the services 204 can utilize third-party APIs to communicate with third-party applications. For example, if intrusion or tampering is detected, a customized notification can be transmitted to an emergency response system, such as one provided by a police department, using an API of the emergency response system.
- Third-party APIs can also be used to collect user data from third-parties. For example, an API of a social network provider can be utilized to gather user data for a user.
- FIG. 3 is an abstracted functional view of one embodiment of a system 300 for detecting tampering of a security keypad device.
- Smart devices such as those of the smart-home environment 100 of FIG. 1 , share common characteristics in that each smart device is a data consumer 302 (DC), a data source 304 (DS), a services consumer 306 (SC), and a services source 308 (SS).
- System 300 can be configured to harness the large amount of data generated by the smart devices to provide a variety of automated, extensible, flexible, and/or scalable technologies for achieving useful objectives. These objectives may be predefined or adaptively identified based on, e.g., user activity data or user input.
- System 300 includes processing engine 206 , which further includes a number of paradigms 310 .
- Processing engine 206 can include a managed services paradigm 310 a that monitors and manages device functions, such as ensuring proper operation of a device, responding to emergency situations, or detecting failure of equipment coupled to the device (e.g., a burned out light bulb).
- Processing engine 206 can further include an advertising/communication paradigm 310 b that identifies characteristics (e.g., demographic information) of a user or products of interest to a user based on device usage.
- Processing engine 206 can further include a social paradigm 310 c that collects data from and transmits data to a social network. For example, a user's status as reported on the social network can be collected and processed to determine user activity.
- the processing engine 206 can also utilize extrinsic information 316 with the processing paradigms.
- Extrinsic information 316 can be used to interpret data received from a smart device, to determine a characteristic of the environment near the smart device (e.g., outside an enclosure that contains the smart device), to determine services or products available to the user, to identify a social network or social-network information, to determine contact information of entities (e.g., public service entities such as an emergency response team, the police or a hospital) near the smart device, or to identify statistical or environmental conditions, trends or other information associated with a home or neighborhood.
- entities e.g., public service entities such as an emergency response team, the police or a hospital
- FIG. 4 is a block diagram of an embodiment of a security keypad device 400 for detecting tampering.
- Security keypad device 400 includes a processor 402 , a high power wireless module 404 , a low power wireless module 406 , a cellular module 408 , an accelerometer 410 , a horn 412 , a keypad 414 , an AIR position sensor 416 , a speaker 418 , a battery compartment 420 , sensors 422 , and a power cord 424 .
- Processor 402 is coupled to high power wireless module 404 , low power wireless module 406 , and cellular module 408 for communication with other devices and computers.
- high power wireless module 404 establishes wireless communication with a router or gateway of a local area network using relatively high data rate, high power wireless protocols such as the IEEE 802.11 Wi-Fi protocols. The router or gateway also provides access to the internet.
- Processor 402 can use high power wireless module 404 to transmit data, such as tampering events or logs, to a computer server system via the internet.
- Processor 402 can also receive data from the computer server system via high power wireless module 404 .
- security keypad device 400 receives a notification from the computer server system when there is a power outage for an area that includes the home.
- Low power wireless module 406 communicates directly with other smart devices in the home via a personal area mesh network using relatively low power and lower transmission rate wireless protocols such as the IEEE 802.15.4 protocols.
- Processor 402 can use low power wireless module 406 to receive data from other smart devices and sensors in the home. For example, processor 402 can receive signals via low power wireless module 406 from other smart devices in the home that detect a door opening or other types of motion indicating an intrusion. Processor 402 can also transmit signals to other smart devices using low power wireless module 406 . In one embodiment, when security keypad device 400 detects tampering, processor 402 uses low power wireless module 406 to transmit signals to other smart devices that cause the other smart devices to activate audible alarms.
- Cellular module 408 is used for communication with cell towers of a wide area network using mobile telecommunications technologies such as 3G or 4G. In one embodiment, cellular module 408 is used as a backup mode of communication. For example, if there is a power outage in the home or if the router is not functioning properly, cellular module 408 can be used to transmit tampering or intrusion events to the computer server system. In one embodiment, high power wireless module 404 can be used to determine if the router is functioning properly based on data that is received, or is expected but not received, from the router.
- Processor 402 is also coupled to accelerometer 410 and AIR position sensor 416 to detect tampering.
- Accelerometer 410 measures acceleration forces that are applied to security keypad device 400 . Measured acceleration forces include the gravitational force of the earth as well as other forces that are physically applied to the security keypad device 400 . Readings from accelerometer 410 can include both the direction and the magnitude of the acceleration forces.
- Processor 402 receives readings from accelerometer 410 and can determine if there is tampering with security keypad device 400 based on the readings. In one embodiment, a threshold setting is used to determine if there is tampering so that false alarms are not reported for common events such as geological tremors.
- a tampering event is reported.
- a double integral of the acceleration force over time is calculated to determine if the position of security keypad device 402 changed and a tampering event is reported only if the position changed.
- AIR position sensor 416 includes one or more infrared emitting light sources and one or more infrared sensors. Infrared light emitted by the light sources is reflected back to the infrared sensors by objects or walls in the home. In one embodiment, the time that the infrared light is emitted and the time that the reflected infrared light is detected is tracked. The relative position of the security keypad device 400 can then be determined by using time-of-flight techniques. In another embodiment, the relative position of the security keypad device 400 can be determined based on the intensity of the reflected light that is detected.
- the infrared light sources are aimed in different directions so that the emitted rays of infrared light reflect off of different objects.
- processor 402 determines that the position of the security keypad device 400 changed if readings from the AIR position sensor 416 indicate a change in the relative positions of every object that is reflecting infrared light. On the other hand, if the readings indicate that only the relative position of one object that is reflecting infrared light has changed, it can be determined that there is only external motion and the position of the security keypad device 400 has not changed.
- readings from the AIR position sensor 416 can be combined with readings from the accelerometer 410 . If both readings indicate a change in position, processor 402 determines that the position of the security keypad device 400 changed. If only the readings from AIR position sensor 416 indicate a change in position, processor 402 determines that the position of an external object has changed.
- Keypad 414 provides an interface for users to control security keypad device 400 .
- Keypad 414 receives input from users and transmits the input to processor 402 .
- User input can include entering a code for deactivating the security system or entering a command for arming the security system.
- keypad 414 is a touchscreen device that generates a graphical keypad display. When the security system is in the armed or countdown state, touchscreen keypad 414 can be turned off or used to display an image that disguises the keypad 414 or the security keypad device 400 .
- touchscreen keypad 414 can display an image that matches the casing of the security keypad device 400 so that an intruder will not recognize the device as a security keypad device. If the user needs to use the keypad 414 , an inconspicuous button or area of the touchscreen can be pressed to display the keypad or other controls for the security system.
- Horn 412 and speaker 418 generate audible alarms and alerts for security keypad device 400 .
- horn 412 is activated by processor 402 to generate a loud alarm sound if intrusion or tampering is detected.
- Speaker 418 is used to communicate non-emergency messages or notifications to the user. For example, if security keypad device 400 is moved or if an object is placed is front security keypad device 400 such that the AIR position sensor is blocked when the security system is in a quiescent state, speaker 418 can be activated to notify the user.
- the security keypad device may notify, via one or more of the cellular, high power wireless, and low power wireless communication modules, an external computing system (e.g., a remote cloud server) and/or a user's mobile device that an anomalous condition such as tampering has been detected.
- an external computing system e.g., a remote cloud server
- Battery compartment 420 and power cord 424 provide operating power for security keypad device 400 .
- Power cord 424 connects to a primary power source such as the main electric power line of the house.
- Battery compartment 420 holds a backup or secondary power source such as rechargeable batteries.
- the components are configured such that power cord 424 must be disconnected from the security keypad device 400 in order to open the battery compartment 420 .
- a latch or button that opens the battery compartment 420 can be located in a recess where the power cord 424 connects, such that the latch or button is hidden by the power cord 424 when the power cord 424 is connected to security keypad device 400 .
- the battery compartment 420 can be located at the bottom surface of security keypad device 400 , such that security keypad device 400 must be picked up to access the battery compartment 420 .
- Accelerometer 410 or AIR position sensor 416 can detect that security keypad device 400 has been picked up and a tampering event is reported if security keypad device 400 is armed.
- Sensors 422 include a sensor that can detect if the power cord 424 is disconnected.
- the power cord 424 completes a circuit when it is connected to security keypad device 400 and sensors 422 can detect a break in the circuit.
- power cord 424 includes a magnet located at the end that connects to security keypad device 400 and sensors 422 include a reed sensor or Hall effect sensor that can detect the magnet when the power cord 424 is connected.
- a signal is transmitted to processor 402 if sensors 422 detect that power cord 424 has been disconnected and a tampering event is reported if the security system is in the armed or countdown state.
- Sensors 422 can also include a sensor that detects when the primary power source is not supplying power. If it is detected that the primary power source is not supplying power, a different signal is transmitted to processor 402 than if the power cord 424 is disconnected and processor 402 can take different actions. For example, the tampering event can be transmitted to the computer server system via high power wireless module 404 if the power cord 424 is disconnected. On the other hand, if the primary power source is not supplying power, the tampering event can be transmitted via cellular module 408 .
- FIG. 5 is a flowchart of one embodiment of a process 500 for detecting tampering of a security keypad device.
- This process can be performed by a security keypad device such as the one illustrated in FIG. 4 .
- the security keypad device is initially in an armed state 502 . If the security keypad device detects that the power cord has been disconnected (block 504 ) or if it is detected that the position or orientation of the security keypad device has changed (block 506 ), the security keypad device goes into an alarm state 508 . Detection of the disconnected power cord and of the position/orientation change can be accomplished according to any of the embodiments described herein. For example, the position/orientation change of the security keypad device can be detected by another smart device, such as a video camera, and the security keypad device can go into the alarm state 508 in response to receiving a signal from the other smart device.
- another smart device such as a video camera
- security keypad device After going into the alarm state 508 , security keypad device transmits a tampering event to a computer server system via the high power wireless module (block 510 ). The tampering event can then be transmitted to a user's computer or mobile device by the computer server system to notify the user of the tampering. Security keypad device also transmits a signal to other smart devices via the low power wireless module (block 512 ) that causes the other smart devices to activate audible alarms. At block 514 , the security keypad device activates its own audible alarm by, for example, activating the horn.
- the security keypad device transmits a tampering event to the computer server system via the cellular module (block 518 ).
- a loss of power from the primary power source indicates that an intruder has tampered with the primary power source.
- security keypad device can further distinguish between a power outage that affects an entire area and a loss of power that only affects the home or enclosure. For example, after detecting the loss of power from the primary power source at block 516 , the security keypad device can wait for a preset period of time for a notification from the computer server system indicating that there was a power outage. The notification can be received via the cellular module and can be a short message service (SMS) text message or some other form of data indicating the power outage. If the notification is received before the period of time has elapsed, the security keypad device goes back to the armed state 502 .
- SMS short message service
- the security keypad device can also activate the audible alarm and transmit signals to other smart devices to activate audible alarms if the notification is not received.
- motion or intrusion is detected (block 520 ) while the security keypad device is in the armed state 502 , the security keypad device goes into a countdown state 522 .
- Motion or intrusion can be detected by the security keypad device, e.g., by the AIR position sensor. Motion or intrusion can also be detected by other smart devices, e.g., door and window sensors or video cameras, that transmit a signal to the security keypad device.
- the security keypad device In the countdown state 522 , the security keypad device provides a preset period of time for the user to enter the code. If a valid code is received at block 524 before the period of time has elapsed, the security keypad device goes into a quiescent state 526 . If a valid code is not received at block 524 before the preset period of time has elapsed, the security keypad device goes into the alarm state 508 and blocks 510 , 512 , and 514 are performed.
- the security keypad device will immediately go into the alarm state 508 and blocks 510 , 512 , and 514 are performed.
- a tampering event is transmitted to the computer server system via the high power wireless module (block 530 ).
- the tampering event indicates whether the security keypad device has been repositioned or an object has been placed in front of the security keypad device.
- a speaker of the security keypad device can also be activated to notify the user. The speaker can audibly announce that the security keypad device has been repositioned or that an object has been placed in front of the security keypad device.
- the security keypad device goes into the armed state 502 .
- the security system can be activated, for example, by a user pressing a button on the keypad or using an application executed on a mobile device.
- the security keypad device or other smart devices can detect when all users have left the home or enclosure and the security keypad device automatically activates the security system.
- FIG. 6 is a block diagram of an exemplary environment for implementing one embodiment of a system for detecting tampering of a security keypad device.
- the exemplary environment includes a computer system 600 that can be used by a user 604 to remotely control, for example, one or more of the smart devices according to one or more of the embodiments described herein.
- the computer system 600 can alternatively be used for carrying out one or more of the server-based processing described herein above or as a processing device in a larger distributed computer server system for carrying out processing.
- the computer system 600 can include a computer 602 , keyboard 622 , a network router 612 , a printer 608 , and a monitor 606 .
- the monitor 606 , processor 602 and keyboard 622 are part of a computer system 626 , which can be a laptop computer, desktop computer, handheld computer, mainframe computer, etc.
- the monitor 606 can be a CRT, flat screen, etc.
- a user 604 can input commands into the computer 602 using various input devices, such as a mouse, keyboard 622 , track ball, touch screen, etc. If the computer system 600 comprises a mainframe, a designer 604 can access the computer 602 using, for example, a terminal or terminal interface. Additionally, the computer system 626 may be connected to a printer 608 and a server 610 using a network router 612 , which may connect to the Internet 618 or a WAN. While only one server 610 is shown in the figure, it is understood that computer system 626 can be connected to any number of servers.
- the server 610 may be used to store additional software programs and data.
- software implementing the systems and methods described herein can be stored on a storage medium in the server 610 .
- the software can be run from the storage medium in the server 610 .
- software implementing the systems and methods described herein can be stored on a storage medium in the computer 602 .
- the software can be run from the storage medium in the computer system 626 . Therefore, in this embodiment, the software can be used whether or not computer 602 is connected to network router 612 .
- Printer 608 may be connected directly to computer 602 , in which case, the computer system 626 can print whether or not it is connected to network router 612 .
- FIG. 7 is a block diagram of an embodiment of a special-purpose computer system 700 for detecting tampering of a security keypad device.
- the methods and systems described herein may be implemented by computer-program products that direct a computer system to perform the actions of the methods and components.
- Each such computer-program product may comprise sets of instructions (codes) embodied on a computer-readable medium that directs the processor of a computer system to perform corresponding actions.
- the instructions may be configured to run in sequential order, or in parallel (such as under different processing threads), or in a combination thereof.
- Special-purpose computer system 700 comprises a computer 702 , a monitor 706 coupled to computer 702 , one or more additional user output devices 730 (optional) coupled to computer 702 , one or more user input devices 740 (e.g., keyboard, mouse, track ball, touch screen) coupled to computer 702 , an optional communications interface 750 coupled to computer 702 , a computer-program product 705 stored in a tangible computer-readable memory in computer 702 .
- Computer-program product 705 directs system 700 to perform the above-described methods.
- Computer 702 may include one or more processors 760 that communicate with a number of peripheral devices via a bus subsystem 790 .
- peripheral devices may include user output device(s) 730 , user input device(s) 740 , communications interface 750 , and a storage subsystem, such as random access memory (RAM) 770 and non-transitory storage drive 780 (e.g., disk drive, optical drive, solid state drive), which are forms of tangible computer-readable memory.
- RAM random access memory
- non-transitory storage drive 780 e.g., disk drive, optical drive, solid state drive
- Computer-program product 705 may be stored in non-transitory storage drive 780 or another computer-readable medium accessible to computer 702 and loaded into memory 770 .
- Each processor 760 may comprise a microprocessor, such as a microprocessor from Intel® or Advanced Micro Devices, Inc.®, or the like.
- the computer 702 runs an operating system that handles the communications of product 705 with the above-noted components, as well as the communications between the above-noted components in support of the computer-program product 705 .
- Exemplary operating systems include Windows® or the like from Microsoft Corporation, Solaris® from Sun Microsystems, LINUX, UNIX, and the like.
- User input devices 740 include all possible types of devices and mechanisms to input information to computer system 702 . These may include a keyboard, a keypad, a mouse, a scanner, a digital drawing pad, a touch screen incorporated into the display, audio input devices such as voice recognition systems, microphones, and other types of input devices. In various embodiments, user input devices 740 are typically embodied as a computer mouse, a trackball, a track pad, a joystick, wireless remote, a drawing tablet, a voice command system. User input devices 740 typically allow a user to select objects, icons, text and the like that appear on the monitor 706 via a command such as a click of a button or the like. User output devices 730 include all possible types of devices and mechanisms to output information from computer 702 . These may include a display (e.g., monitor 706 ), printers, non-visual displays such as audio output devices, etc.
- a display e.g., monitor 706
- non-visual displays such as audio output devices, etc.
- Communications interface 750 provides an interface to other communication networks and devices and may serve as an interface to receive data from and transmit data to other systems, WANs and/or the Internet 618 .
- Embodiments of communications interface 750 typically include an Ethernet card, a modem (telephone, satellite, cable, ISDN), a (asynchronous) digital subscriber line (DSL) unit, a FireWire® interface, a USB®, interface, a wireless network adapter, and the like.
- communications interface 750 may be coupled to a computer network, to a FireWire® bus, or the like.
- communications interface 750 may be physically integrated on the motherboard of computer 702 , and/or may be a software program, or the like.
- RAM 770 and non-transitory storage drive 780 are examples of tangible computer-readable media configured to store data such as computer-program product embodiments of the present invention, including executable computer code, human-readable code, or the like.
- Other types of tangible computer-readable media include floppy disks, removable hard disks, optical storage media such as CD-ROMs, DVDs, bar codes, semiconductor memories such as flash memories, read-only-memories (ROMs), battery-backed volatile memories, networked storage devices, and the like.
- RAM 770 and non-transitory storage drive 780 may be configured to store the basic programming and data constructs that provide the functionality of various embodiments of the present invention, as described above.
- RAM 770 and non-transitory storage drive 780 may also provide a repository to store data and data structures used in accordance with the present invention.
- RAM 770 and non-transitory storage drive 780 may include a number of memories including a main random access memory (RAM) to store instructions and data during program execution and a read-only memory (ROM) in which fixed instructions are stored.
- RAM 770 and non-transitory storage drive 780 may include a file storage subsystem providing persistent (non-transitory) storage of program and/or data files.
- RAM 770 and non-transitory storage drive 780 may also include removable storage systems, such as removable flash memory.
- Bus subsystem 790 provides a mechanism to allow the various components and subsystems of computer 702 to communicate with each other as intended. Although bus subsystem 790 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple busses or communication paths within the computer 702 .
- the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a swim diagram, a data flow diagram, a structure diagram, or a block diagram. Although a depiction may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged.
- a process is terminated when its operations are completed, but could have additional steps not included in the figure.
- a process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
- embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages, and/or any combination thereof.
- the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGAs field programmable gate arrays
- processors controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
- the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein.
- Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein.
- software codes may be stored in a memory.
- Memory may be implemented within the processor or external to the processor.
- the term “memory” refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
- the term “storage medium” may represent one or more memories for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
- ROM read only memory
- RAM random access memory
- magnetic RAM magnetic RAM
- core memory magnetic disk storage mediums
- optical storage mediums flash memory devices and/or other machine readable mediums for storing information.
- machine-readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels, and/or various other storage mediums capable of storing that contain or carry instruction(s) and/or data.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Environmental Sciences (AREA)
- Environmental & Geological Engineering (AREA)
- Human Computer Interaction (AREA)
- Remote Sensing (AREA)
- Business, Economics & Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Ecology (AREA)
- Emergency Management (AREA)
- Mechanical Engineering (AREA)
- Combustion & Propulsion (AREA)
- Chemical & Material Sciences (AREA)
- Mathematical Physics (AREA)
- Fuzzy Systems (AREA)
- Electromagnetism (AREA)
- Power Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Selective Calling Equipment (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Patent Application No. 61/887,963, filed Oct. 7, 2013, the entire disclosure of which is hereby incorporated by reference for all purposes.
- 1. The Field of the Invention
- The present invention generally relates to security system keypads. More specifically, the present invention relates to physical tampering detection for a security keypad.
- 2. The Relevant Technology
- The keypad is an integral component of home security systems. The keypad functions as a user interface for a security system, providing controls for the operation of the security system and displaying output information from the security system. For example, a user can use the keypad to activate the security system when leaving home and to disable the system when the user returns. Keypads also include a display screen or indicator lights for communicating information to the user, such as the state of the security system.
- The keypad is connected to a control panel, which is also connected to the sensors of the system. The control panel performs the central processing functions for the security system. Readings from the sensors and user input received by the keypad are transmitted to the control panel for processing. When an intrusion is detected by the sensors, the control panel triggers the alarm response, which can include activating an audible alarm and transmitting a notification to authorities or users.
- In one embodiment, a system for detecting tampering of a security keypad device is presented. The system includes the security keypad device and a computer server system. The computer server system is communicatively coupled to the security keypad device.
- The security keypad device includes a keypad, a high power wireless module, a low power wireless module, and a cellular module. The high power wireless module is configured to transmit and receive data wirelessly via a local area network. The low power wireless module, while often transmitting and receiving data wirelessly via a personal area network at a lower rate of data transfer than the high power wireless module, nevertheless generally consumes less power than the high power wireless module. The cellular module is configured to transmit and receive data wirelessly via a wide area network.
- The security keypad device further includes a power cord configured to transfer power to the security keypad device from a primary power source, a battery compartment configured to hold a secondary power source, an active infrared (IR) position sensor and an accelerometer. The active IR position sensor comprises a light source configured to emit IR light and an IR sensor configured to detect reflected IR light. The active IR position sensor is configured to sense the position of the security keypad device based on detecting the reflected IR light. The accelerometer is configured to measure an acceleration force.
- The security keypad device further includes a processor configured to receive positional data from the active IR position sensor and acceleration data from the accelerometer. The processor determines that the position of the security keypad device changed based on the positional data or the acceleration data and transmits a tampering event to the computer server system in response to determining that the position of the security keypad device changed. The tampering event indicates that the security keypad device has been physically tampered with.
- The computer server system is configured to receive the tampering event and transmit the tampering event to a mobile device that is authorized to access the account associated with the security keypad device.
- In another embodiment, a security keypad device for detecting tampering is presented. The security keypad device includes a keypad, a high power wireless module, a low power wireless module, and a cellular module. The low power wireless module, while often transmitting and receiving data wirelessly via a personal area network at a lower rate of data transfer than the high power wireless module, nevertheless generally consumes less power than the high power wireless module. The cellular module is configured to transmit and receive data wirelessly via a wide area network.
- The security keypad device further includes a horn, an active IR position sensor, an accelerometer, and a processor. The horn is configured to generate an audible alarm. The active IR position sensor comprises a light source configured to emit IR light and an IR sensor configured to detect reflected IR light. The active IR position sensor is configured to sense the position of the security keypad device based on detecting the reflected IR light. The accelerometer is configured to measure an acceleration force. The processor is configured to receive positional data from the active IR position sensor and acceleration data from the accelerometer. The processor determines that the position of the security keypad device changed based on the positional data or the acceleration data, determines whether the degree of change is sufficient to constitute an anomalous condition such as a tampering attempt, and activates the horn in response to determining the presence of the anomalous condition. Alternatively or in conjunction with activating the horn, the security keypad device may notify, via one or more of the cellular, high power wireless, and low power wireless communication modules, an external computing system (e.g., a remote cloud server) and/or a user's mobile device that an anomalous condition such as tampering has been detected.
- In a further embodiment, a security keypad device for detecting tampering is presented. The security keypad device includes means for receiving user input of a code, means for communicating data wirelessly via a local area network at a relatively high rate of data transfer that consumes a relatively high amount of power, means for communicating data wirelessly via a personal area network at a relatively low rate of data transfer that consumes a relatively low amount of power, and means for communicating data wirelessly via a wide area network.
- The security keypad device further includes means for emitting infrared (IR) light, means for detecting reflected IR light, means for sensing a position of the security keypad device based on detecting the reflected IR light, and means for measuring an acceleration force on the security keypad device. The security keypad device also includes means for determining that the position of the security keypad device changed based on at least one of the sensed position and the measured acceleration force, and means for generating an audible alarm in response to determining that the position of the security keypad device changed.
- A further understanding of the nature and advantages of various embodiments may be realized by reference to the following figures. In the appended figures, similar components or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label by a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
-
FIG. 1 is an example of a smart-home environment within which one embodiment of a system for detecting tampering of a security keypad device can be implemented. -
FIG. 2 is a network-level view of one embodiment of a system for detecting tampering of a security keypad device. -
FIG. 3 is an abstracted functional view of one embodiment of a system for detecting tampering of a security keypad device. -
FIG. 4 is a block diagram of an embodiment of a security keypad device for detecting tampering. -
FIG. 5 is a flowchart of one embodiment of a process for detecting tampering of a security keypad device. -
FIG. 6 is a block diagram of an exemplary environment for implementing one embodiment of a system for detecting tampering of a security keypad device. -
FIG. 7 is a block diagram of an embodiment of a special-purpose computer system for detecting tampering of a security keypad device. - The ensuing description provides preferred exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the disclosure. Rather, the ensuing description of the preferred exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing a preferred exemplary embodiment. It is understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope as set forth in the appended claims.
- Security systems use a variety of different sensors to detect intruders for a home or enclosure. However, sensors are unable to discern the difference between an intruder and an occupant. To reduce false alarms that are triggered by the occupant, security systems provide a countdown when an intrusion is detected. The alarm will be triggered when the countdown reaches zero and the occupant must enter a code into the keypad before that happens to avoid a false alarm. Once the code is entered, the security system switches to a quiescent state so that the alarm will not be triggered by the occupant while the occupant is home.
- The keypad is typically located close to an entrance of the home and provides an indication of the countdown once an intrusion is detected. When an intruder enters the home and sees the keypad, often times the intruder will try to “smash and bash” the keypad to prevent the system from triggering the alarm. In some security systems, the control panel is integrated into the keypad. The intruder can effectively disable these systems if the keypad is destroyed before the countdown reaches zero.
- The embodiments of the invention described herein below address such issues by providing devices and systems for detecting physical tampering. In one embodiment, a security keypad device includes an active infrared (AIR) position sensor and an accelerometer. The AIR position sensor includes a light source that emits infrared light and an infrared sensor that detects reflected infrared light. The position of the security keypad device is determined based on the reflected infrared light that is detected. The accelerometer measures acceleration forces on the security keypad device. When the AIR position sensor or the accelerometer detects a change in the position of the security keypad device, an alarm is activated or a tampering event is transmitted to the user.
-
FIG. 1 is an example of a smart-home environment 100 within which one embodiment of a system for detecting tampering of a security keypad device can be implemented. The depicted smart-home environment 100 includes anenclosure 150, which can be, e.g., a house, office building, hotel, retail store, garage, or mobile home. The system can also be implemented in a smart-home environment 100 that does not include anentire enclosure 150, such as an apartment, condominium, or office space. - The depicted
enclosure 150 includes a plurality ofrooms 152, separated at least partly from each other viawalls 154. Thewalls 154 can include interior walls or exterior walls. Each room can further include afloor 156 and aceiling 158. Devices can be mounted on, integrated with and/or supported by awall 154,floor 156 orceiling 158. Further, the smart home environment can include devices outside of theactual enclosure 150, such as a pool heater or irrigation system. - The smart-
home environment 100 includes a plurality of intelligent, multi-sensing, network-connected devices (hereinafter referred to as “the smart devices”) that can integrate seamlessly with each other and with acomputer server system 164, such as a cloud-computing system. The smart devices can includesmart thermostats 102,smart hazard detectors 104, smart entryway devices 106 (e.g., doorbells or intercoms), smart wall switches 108, smart wall plug interfaces 110, andsmart appliances 112, such as refrigerators, stoves and/or ovens, televisions, washers, dryers, lights, stereos, intercom systems, garage-door openers, floor fans, ceiling fans, wall air conditioners, pool heaters, irrigation systems, security systems, and so forth. The smart-home environment 100 also includes asmart security keypad 114 and asmart video camera 116. - Any of the smart devices in the smart-home environment can include any number of sensors. For example,
smart appliances 112 can include sensors that detect when they are being used. Additionally, a motion or occupancy sensor, such as an ultrasonic, passive infrared (PIR), or optical sensor, can be included in any of the smart devices to detect movement and activity. Some smart devices will also have sensors specific to the device. For example, a smart light can include an ambient light sensor, such as a photoresistor or a single-pixel sensor that measures light in the room.Smart hazard detectors 104 can include smoke/fire/heat sensors, carbon monoxide/dioxide sensors, radon gas detectors, ambient light sensors, temperature sensors, humidity sensors, and the like. Any smart device can also include a processor for processing data from the sensors or other devices. - Each smart device is also equipped with communications ports or transceivers for communicating data with other smart devices. In one embodiment, the devices establish a mesh network for communication between devices. In another embodiment, the devices can connect, via a router or
gateway 160, to a private network or theinternet 162, including anycomputer server system 164 and computing device that is connected to the same network. The required data communications can be carried out using one or more of a variety of custom or standard wireless protocols (e.g., cellular, 3G/4G, Wi-Fi, ZigBee, 6LoWPAN, BLE, etc.) and/or any of a variety of custom or standard wired protocols (CAT6 Ethernet, HomePlug, etc.). One particularly useful protocol that can be used is the Thread protocol, which is promulgated by the Thread Group and based on 802.15.4, IETF IPv6, and 6LoWPAN. For some embodiments, devices that are powered by the household mains current, either directly or through an AC power adapter, can be provided with a combination of Wi-Fi, which can be relatively power-intensive, along with one or more lower-power protocols such as Thread and/or BLE. In contrast, devices that are power-constrained in that they are not powered by the household mains current and do not have access to a high-capacity battery source are provided only with one or more low-power protocols such as Thread and/or BLE. In some cases, devices that are not powered by the household mains current, but do have access to a reasonably high-capacity battery source, can be provided with a combination of Wi-Fi and one or more lower-power protocols such as Thread and/or BLE, with the Wi-Fi communications being controlled to be temporally restricted, such as being turned on only during brief periodic time intervals (e.g., once per day to upload logs and receive updates from the cloud), during particular device-sensed events, or when the user has physically actuated the device such as by pressing a button on the device. - By virtue of network connectivity, one or more of the smart devices can further allow a user to interact with the device even if the user is not proximate to the device. For example, a user can communicate with a device using a computer (e.g., a desktop computer) or mobile device (e.g., a smartphone, laptop computer, or tablet) 166. A webpage or native mobile app can be configured to receive input from the user and control the device based on the input. The webpage or mobile app can also present information about the device's operation to the user. For example, the user can view the status of a smart hazard detector or a history of notifications generated by the smart hazard detector. The user can be in the enclosure during this remote communication or outside the enclosure.
- In particular,
smart security keypad 114 includes one or more AIR position sensors and an accelerometer sensor.Security keypad 114 is a detached device that is not mounted to theenclosure 150 and can be located anywhere in the home. In this embodiment,security keypad 114 is located by the front entrance of the home so that the sensors can detect people coming in to the home. This location also allows a user to quickly reach the keypad and enter the code after entering the home.Security keypad 114 can be disguised to look like other objects that are commonly found in a home, such as decorative or ornamental pieces. In this embodiment, the casing that contains the various components ofsecurity keypad 116 is shaped to resemble a vase or candle holder. The casing disguisessecurity keypad 114 from intruders that are not familiar with the device. -
Video camera 116 includes an image sensor for capturing image frames and is aimed atsecurity keypad 114. In one embodiment,video camera 116 can detect a change in the positioning of objects that are in the viewing area. For example, the processor ofvideo camera 116 can be configured to compare two image frames captured at different points in time to detect position changes. Ifvideo camera 116 detects a change in the position ofsecurity keypad 114, a short video clip, such as 30 seconds, of the position change recording is transmitted tocomputer server system 164. The user can then view the clip from a computer or mobile device.Security keypad 114 andvideo camera 116 can also upload text logs tocomputer server system 164, which can then be accessed by users. - According to embodiments, the
smart keypad 114,video camera 116, or other smart devices in the home are capable of assigning user-defined gestures to actions or sets of actions. For example, the user can program thesmart keypad 114 with a panic gesture that causes thesmart keypad 114, other devices in the smart home, or thecomputer server system 164 to notify authorities, such as by calling or otherwise notifying a medical or police emergency response unit. Such a panic gesture can be, for example, the user quickly waving his or her hands in the air. The user can also program thesmart keypad 114 or other smart devices in the home with an audible panic command. For example, when the user yells “help”, then the medical or police emergency response unit can be called or otherwise notified. In other examples, thesmart keypad 114 can include a panic button that the user can press to call the police or medical emergency response unit. -
FIG. 2 is a network-level view of one embodiment of asystem 200 for detecting tampering of a security keypad device.System 200 includescomputer server system 164. Smart devices can communicate with thecomputer server system 164 via a private network or theinternet 162. Smart devices can transmithome data 202, including user data and user activity data, tocomputer server system 164 for processing or storage. More specifically,home data 202 can include power consumption data, occupancy data, HVAC settings and usage data, carbon monoxide levels data, carbon dioxide levels data, volatile organic compounds levels data, sleeping schedule data, cooking schedule data, inside and outside temperature humidity data, television viewership data, inside and outside noise level data, video recording data, smart devices' log data, etc. - The
computer server system 164 can further provide one ormore services 204. Theservices 204 can include security monitoring, software updates, customer support, sensor data collection/logging, remote access, remote or distributed control, or use suggestions (e.g., based on collectedhome data 202 to improve performance, reduce utility cost, etc.). To facilitate these services, users can register the smart devices in their home or enclosure with thecomputer server system 164.Computer server system 164 can associate the smart devices with an account during the registration process. The account can be user specific or specific to a home or enclosure that includes multiple users, and a unique identification of each smart device can be stored in the account. In one embodiment, the user's mobile device or other computing device can also be associated with the account during registration. In another embodiment, one or more username and password is associated with the account during registration. The user can then use the username and password to login on the mobile or computing device, andcomputer server system 164 can use the account to authorize the user's mobile or computing device for theservices 204. Data associated with theservices 204, such as account data, can be stored at thecomputer server system 164. -
System 200 includes aprocessing engine 206, which can be concentrated at a single server or distributed among several different computing entities without limitation. A single server can also include multiple engines for performing different processing tasks. Theprocessing engine 206 can receive data from smart devices, index and store the data, or process the data to generate customized notifications or statistics. The processed data can be stored as derivedhome data 208. Results of the processing can be transmitted back to the device that provided the home data, to other devices, to a server providing a webpage to a user of the device, or to other non-device entities. For example, intrusion and tampering notifications can be generated by theprocessing engine 206 and transmitted to a user device via theInternet 162. In this manner, theprocessing engine 206 can be configured and programmed to derive a variety of useful information from thehome data 202. - In some embodiments, to encourage innovation and research and to increase products and services available to users,
system 200 provides application programming interfaces (APIs) 210 to third parties, such ascharities 222, governmental entities 224 (e.g., emergency response units such as a fire department or police department, the Food and Drug Administration, or the Environmental Protection Agency), academic institutions 226 (e.g., university researchers), businesses 228 (e.g., security or fire monitoring service providers, social network providers, device warranty or equipment service providers, or providers of targeted advertisements based on home data),utility companies 230, and other third parties. TheAPIs 210 permit third-party systems to communicate with thecomputer server system 164, providing access to theservices 204, theprocessing engine 206, thehome data 202, and the derivedhome data 208. This allows third-party applications to submit specific data processing tasks to thecomputer server system 164 and receive dynamic updates to thehome data 202 and the derivedhome data 208. For example, a police department or security monitoring service provider can develop applications using theAPIs 210 to provide emergency response services to users. - In other embodiments, the
services 204 can utilize third-party APIs to communicate with third-party applications. For example, if intrusion or tampering is detected, a customized notification can be transmitted to an emergency response system, such as one provided by a police department, using an API of the emergency response system. Third-party APIs can also be used to collect user data from third-parties. For example, an API of a social network provider can be utilized to gather user data for a user. -
FIG. 3 is an abstracted functional view of one embodiment of asystem 300 for detecting tampering of a security keypad device. Smart devices, such as those of the smart-home environment 100 ofFIG. 1 , share common characteristics in that each smart device is a data consumer 302 (DC), a data source 304 (DS), a services consumer 306 (SC), and a services source 308 (SS).System 300 can be configured to harness the large amount of data generated by the smart devices to provide a variety of automated, extensible, flexible, and/or scalable technologies for achieving useful objectives. These objectives may be predefined or adaptively identified based on, e.g., user activity data or user input. -
System 300 includesprocessing engine 206, which further includes a number of paradigms 310.Processing engine 206 can include a managedservices paradigm 310 a that monitors and manages device functions, such as ensuring proper operation of a device, responding to emergency situations, or detecting failure of equipment coupled to the device (e.g., a burned out light bulb).Processing engine 206 can further include an advertising/communication paradigm 310 b that identifies characteristics (e.g., demographic information) of a user or products of interest to a user based on device usage.Processing engine 206 can further include asocial paradigm 310 c that collects data from and transmits data to a social network. For example, a user's status as reported on the social network can be collected and processed to determine user activity. - The
processing engine 206 can also utilizeextrinsic information 316 with the processing paradigms.Extrinsic information 316 can be used to interpret data received from a smart device, to determine a characteristic of the environment near the smart device (e.g., outside an enclosure that contains the smart device), to determine services or products available to the user, to identify a social network or social-network information, to determine contact information of entities (e.g., public service entities such as an emergency response team, the police or a hospital) near the smart device, or to identify statistical or environmental conditions, trends or other information associated with a home or neighborhood. -
FIG. 4 is a block diagram of an embodiment of asecurity keypad device 400 for detecting tampering.Security keypad device 400 includes aprocessor 402, a highpower wireless module 404, a lowpower wireless module 406, acellular module 408, anaccelerometer 410, ahorn 412, akeypad 414, anAIR position sensor 416, aspeaker 418, abattery compartment 420,sensors 422, and apower cord 424. -
Processor 402 is coupled to highpower wireless module 404, lowpower wireless module 406, andcellular module 408 for communication with other devices and computers. In one embodiment, highpower wireless module 404 establishes wireless communication with a router or gateway of a local area network using relatively high data rate, high power wireless protocols such as the IEEE 802.11 Wi-Fi protocols. The router or gateway also provides access to the internet.Processor 402 can use highpower wireless module 404 to transmit data, such as tampering events or logs, to a computer server system via the internet.Processor 402 can also receive data from the computer server system via highpower wireless module 404. In one embodiment,security keypad device 400 receives a notification from the computer server system when there is a power outage for an area that includes the home. - Low
power wireless module 406 communicates directly with other smart devices in the home via a personal area mesh network using relatively low power and lower transmission rate wireless protocols such as the IEEE 802.15.4 protocols.Processor 402 can use lowpower wireless module 406 to receive data from other smart devices and sensors in the home. For example,processor 402 can receive signals via lowpower wireless module 406 from other smart devices in the home that detect a door opening or other types of motion indicating an intrusion.Processor 402 can also transmit signals to other smart devices using lowpower wireless module 406. In one embodiment, whensecurity keypad device 400 detects tampering,processor 402 uses lowpower wireless module 406 to transmit signals to other smart devices that cause the other smart devices to activate audible alarms. -
Cellular module 408 is used for communication with cell towers of a wide area network using mobile telecommunications technologies such as 3G or 4G. In one embodiment,cellular module 408 is used as a backup mode of communication. For example, if there is a power outage in the home or if the router is not functioning properly,cellular module 408 can be used to transmit tampering or intrusion events to the computer server system. In one embodiment, highpower wireless module 404 can be used to determine if the router is functioning properly based on data that is received, or is expected but not received, from the router. -
Processor 402 is also coupled toaccelerometer 410 andAIR position sensor 416 to detect tampering.Accelerometer 410 measures acceleration forces that are applied tosecurity keypad device 400. Measured acceleration forces include the gravitational force of the earth as well as other forces that are physically applied to thesecurity keypad device 400. Readings fromaccelerometer 410 can include both the direction and the magnitude of the acceleration forces.Processor 402 receives readings fromaccelerometer 410 and can determine if there is tampering withsecurity keypad device 400 based on the readings. In one embodiment, a threshold setting is used to determine if there is tampering so that false alarms are not reported for common events such as geological tremors. Thus, if a force greater than the threshold is applied tosecurity keypad device 400 or if there is a change in force that is greater than the threshold, a tampering event is reported. In another embodiment, a double integral of the acceleration force over time is calculated to determine if the position ofsecurity keypad device 402 changed and a tampering event is reported only if the position changed. -
AIR position sensor 416 includes one or more infrared emitting light sources and one or more infrared sensors. Infrared light emitted by the light sources is reflected back to the infrared sensors by objects or walls in the home. In one embodiment, the time that the infrared light is emitted and the time that the reflected infrared light is detected is tracked. The relative position of thesecurity keypad device 400 can then be determined by using time-of-flight techniques. In another embodiment, the relative position of thesecurity keypad device 400 can be determined based on the intensity of the reflected light that is detected. - In embodiments with multiple infrared light sources and multiple infrared sensors, the infrared light sources are aimed in different directions so that the emitted rays of infrared light reflect off of different objects. In one embodiment,
processor 402 determines that the position of thesecurity keypad device 400 changed if readings from theAIR position sensor 416 indicate a change in the relative positions of every object that is reflecting infrared light. On the other hand, if the readings indicate that only the relative position of one object that is reflecting infrared light has changed, it can be determined that there is only external motion and the position of thesecurity keypad device 400 has not changed. - In another embodiment, readings from the
AIR position sensor 416 can be combined with readings from theaccelerometer 410. If both readings indicate a change in position,processor 402 determines that the position of thesecurity keypad device 400 changed. If only the readings fromAIR position sensor 416 indicate a change in position,processor 402 determines that the position of an external object has changed. -
Keypad 414 provides an interface for users to controlsecurity keypad device 400.Keypad 414 receives input from users and transmits the input toprocessor 402. User input can include entering a code for deactivating the security system or entering a command for arming the security system. In one embodiment,keypad 414 is a touchscreen device that generates a graphical keypad display. When the security system is in the armed or countdown state,touchscreen keypad 414 can be turned off or used to display an image that disguises thekeypad 414 or thesecurity keypad device 400. For example,touchscreen keypad 414 can display an image that matches the casing of thesecurity keypad device 400 so that an intruder will not recognize the device as a security keypad device. If the user needs to use thekeypad 414, an inconspicuous button or area of the touchscreen can be pressed to display the keypad or other controls for the security system. -
Horn 412 andspeaker 418 generate audible alarms and alerts forsecurity keypad device 400. In one embodiment,horn 412 is activated byprocessor 402 to generate a loud alarm sound if intrusion or tampering is detected.Speaker 418 is used to communicate non-emergency messages or notifications to the user. For example, ifsecurity keypad device 400 is moved or if an object is placed is frontsecurity keypad device 400 such that the AIR position sensor is blocked when the security system is in a quiescent state,speaker 418 can be activated to notify the user. Alternatively or in conjunction with activating the horn, the security keypad device may notify, via one or more of the cellular, high power wireless, and low power wireless communication modules, an external computing system (e.g., a remote cloud server) and/or a user's mobile device that an anomalous condition such as tampering has been detected. -
Battery compartment 420 andpower cord 424 provide operating power forsecurity keypad device 400.Power cord 424 connects to a primary power source such as the main electric power line of the house.Battery compartment 420 holds a backup or secondary power source such as rechargeable batteries. In one embodiment, the components are configured such thatpower cord 424 must be disconnected from thesecurity keypad device 400 in order to open thebattery compartment 420. For example, a latch or button that opens thebattery compartment 420 can be located in a recess where thepower cord 424 connects, such that the latch or button is hidden by thepower cord 424 when thepower cord 424 is connected tosecurity keypad device 400. Thus, the only way to reach the latch or button to open thebattery compartment 420 is by disconnecting thepower cord 424 from thesecurity keypad device 400. In another embodiment, thebattery compartment 420 can be located at the bottom surface ofsecurity keypad device 400, such thatsecurity keypad device 400 must be picked up to access thebattery compartment 420.Accelerometer 410 orAIR position sensor 416 can detect thatsecurity keypad device 400 has been picked up and a tampering event is reported ifsecurity keypad device 400 is armed. -
Sensors 422 include a sensor that can detect if thepower cord 424 is disconnected. In one embodiment, thepower cord 424 completes a circuit when it is connected tosecurity keypad device 400 andsensors 422 can detect a break in the circuit. In another embodiment,power cord 424 includes a magnet located at the end that connects tosecurity keypad device 400 andsensors 422 include a reed sensor or Hall effect sensor that can detect the magnet when thepower cord 424 is connected. A signal is transmitted toprocessor 402 ifsensors 422 detect thatpower cord 424 has been disconnected and a tampering event is reported if the security system is in the armed or countdown state. -
Sensors 422 can also include a sensor that detects when the primary power source is not supplying power. If it is detected that the primary power source is not supplying power, a different signal is transmitted toprocessor 402 than if thepower cord 424 is disconnected andprocessor 402 can take different actions. For example, the tampering event can be transmitted to the computer server system via highpower wireless module 404 if thepower cord 424 is disconnected. On the other hand, if the primary power source is not supplying power, the tampering event can be transmitted viacellular module 408. -
FIG. 5 is a flowchart of one embodiment of aprocess 500 for detecting tampering of a security keypad device. This process can be performed by a security keypad device such as the one illustrated inFIG. 4 . In this embodiment, the security keypad device is initially in anarmed state 502. If the security keypad device detects that the power cord has been disconnected (block 504) or if it is detected that the position or orientation of the security keypad device has changed (block 506), the security keypad device goes into analarm state 508. Detection of the disconnected power cord and of the position/orientation change can be accomplished according to any of the embodiments described herein. For example, the position/orientation change of the security keypad device can be detected by another smart device, such as a video camera, and the security keypad device can go into thealarm state 508 in response to receiving a signal from the other smart device. - After going into the
alarm state 508, security keypad device transmits a tampering event to a computer server system via the high power wireless module (block 510). The tampering event can then be transmitted to a user's computer or mobile device by the computer server system to notify the user of the tampering. Security keypad device also transmits a signal to other smart devices via the low power wireless module (block 512) that causes the other smart devices to activate audible alarms. Atblock 514, the security keypad device activates its own audible alarm by, for example, activating the horn. - Referring back to when the security keypad device is in the
armed state 502, if it is detected that the primary power source is no longer supplying power (block 516), the security keypad device transmits a tampering event to the computer server system via the cellular module (block 518). In this embodiment, it is assumed that a loss of power from the primary power source indicates that an intruder has tampered with the primary power source. - In other embodiments, security keypad device can further distinguish between a power outage that affects an entire area and a loss of power that only affects the home or enclosure. For example, after detecting the loss of power from the primary power source at
block 516, the security keypad device can wait for a preset period of time for a notification from the computer server system indicating that there was a power outage. The notification can be received via the cellular module and can be a short message service (SMS) text message or some other form of data indicating the power outage. If the notification is received before the period of time has elapsed, the security keypad device goes back to thearmed state 502. If the notification is not received before the period of time has elapsed, the tampering event is transmitted atblock 518. In further embodiments, the security keypad device can also activate the audible alarm and transmit signals to other smart devices to activate audible alarms if the notification is not received. - If motion or intrusion is detected (block 520) while the security keypad device is in the
armed state 502, the security keypad device goes into acountdown state 522. Motion or intrusion can be detected by the security keypad device, e.g., by the AIR position sensor. Motion or intrusion can also be detected by other smart devices, e.g., door and window sensors or video cameras, that transmit a signal to the security keypad device. - In the
countdown state 522, the security keypad device provides a preset period of time for the user to enter the code. If a valid code is received atblock 524 before the period of time has elapsed, the security keypad device goes into aquiescent state 526. If a valid code is not received atblock 524 before the preset period of time has elapsed, the security keypad device goes into thealarm state 508 and blocks 510, 512, and 514 are performed. In another embodiment, if any tampering is detected while the security keypad device is in thecountdown state 522, e.g., power cord disconnected or position/orientation of the security keypad device changed, the security keypad device will immediately go into thealarm state 508 and blocks 510, 512, and 514 are performed. - While the security keypad device is in the
quiescent state 526, if it is detected that the position of the security keypad device changed or an object has been placed in front of the security keypad device (block 528), a tampering event is transmitted to the computer server system via the high power wireless module (block 530). Thus, if a user accidentally placed an object in front of the security keypad device that blocks the AIR position sensor or if a guest of the home tries to reposition the security keypad device to neutralize the AIR position sensor, the user will be notified. In one embodiment, the tampering event indicates whether the security keypad device has been repositioned or an object has been placed in front of the security keypad device. In another embodiment, a speaker of the security keypad device can also be activated to notify the user. The speaker can audibly announce that the security keypad device has been repositioned or that an object has been placed in front of the security keypad device. - If a user activates the security system (block 532) while the security keypad device is in the
quiescent state 526, the security keypad device goes into thearmed state 502. The security system can be activated, for example, by a user pressing a button on the keypad or using an application executed on a mobile device. In another embodiment, the security keypad device or other smart devices can detect when all users have left the home or enclosure and the security keypad device automatically activates the security system. -
FIG. 6 is a block diagram of an exemplary environment for implementing one embodiment of a system for detecting tampering of a security keypad device. The exemplary environment includes acomputer system 600 that can be used by auser 604 to remotely control, for example, one or more of the smart devices according to one or more of the embodiments described herein. Thecomputer system 600 can alternatively be used for carrying out one or more of the server-based processing described herein above or as a processing device in a larger distributed computer server system for carrying out processing. Thecomputer system 600 can include acomputer 602,keyboard 622, anetwork router 612, aprinter 608, and amonitor 606. Themonitor 606,processor 602 andkeyboard 622 are part of acomputer system 626, which can be a laptop computer, desktop computer, handheld computer, mainframe computer, etc. Themonitor 606 can be a CRT, flat screen, etc. - A
user 604 can input commands into thecomputer 602 using various input devices, such as a mouse,keyboard 622, track ball, touch screen, etc. If thecomputer system 600 comprises a mainframe, adesigner 604 can access thecomputer 602 using, for example, a terminal or terminal interface. Additionally, thecomputer system 626 may be connected to aprinter 608 and aserver 610 using anetwork router 612, which may connect to theInternet 618 or a WAN. While only oneserver 610 is shown in the figure, it is understood thatcomputer system 626 can be connected to any number of servers. - The
server 610 may be used to store additional software programs and data. In one embodiment, software implementing the systems and methods described herein can be stored on a storage medium in theserver 610. Thus, the software can be run from the storage medium in theserver 610. In another embodiment, software implementing the systems and methods described herein can be stored on a storage medium in thecomputer 602. Thus, the software can be run from the storage medium in thecomputer system 626. Therefore, in this embodiment, the software can be used whether or notcomputer 602 is connected tonetwork router 612.Printer 608 may be connected directly tocomputer 602, in which case, thecomputer system 626 can print whether or not it is connected tonetwork router 612. -
FIG. 7 is a block diagram of an embodiment of a special-purpose computer system 700 for detecting tampering of a security keypad device. The methods and systems described herein may be implemented by computer-program products that direct a computer system to perform the actions of the methods and components. Each such computer-program product may comprise sets of instructions (codes) embodied on a computer-readable medium that directs the processor of a computer system to perform corresponding actions. The instructions may be configured to run in sequential order, or in parallel (such as under different processing threads), or in a combination thereof. - Special-
purpose computer system 700 comprises acomputer 702, amonitor 706 coupled tocomputer 702, one or more additional user output devices 730 (optional) coupled tocomputer 702, one or more user input devices 740 (e.g., keyboard, mouse, track ball, touch screen) coupled tocomputer 702, anoptional communications interface 750 coupled tocomputer 702, a computer-program product 705 stored in a tangible computer-readable memory incomputer 702. Computer-program product 705 directssystem 700 to perform the above-described methods.Computer 702 may include one ormore processors 760 that communicate with a number of peripheral devices via abus subsystem 790. These peripheral devices may include user output device(s) 730, user input device(s) 740,communications interface 750, and a storage subsystem, such as random access memory (RAM) 770 and non-transitory storage drive 780 (e.g., disk drive, optical drive, solid state drive), which are forms of tangible computer-readable memory. - Computer-
program product 705 may be stored innon-transitory storage drive 780 or another computer-readable medium accessible tocomputer 702 and loaded intomemory 770. Eachprocessor 760 may comprise a microprocessor, such as a microprocessor from Intel® or Advanced Micro Devices, Inc.®, or the like. To support computer-program product 705, thecomputer 702 runs an operating system that handles the communications ofproduct 705 with the above-noted components, as well as the communications between the above-noted components in support of the computer-program product 705. Exemplary operating systems include Windows® or the like from Microsoft Corporation, Solaris® from Sun Microsystems, LINUX, UNIX, and the like. -
User input devices 740 include all possible types of devices and mechanisms to input information tocomputer system 702. These may include a keyboard, a keypad, a mouse, a scanner, a digital drawing pad, a touch screen incorporated into the display, audio input devices such as voice recognition systems, microphones, and other types of input devices. In various embodiments,user input devices 740 are typically embodied as a computer mouse, a trackball, a track pad, a joystick, wireless remote, a drawing tablet, a voice command system.User input devices 740 typically allow a user to select objects, icons, text and the like that appear on themonitor 706 via a command such as a click of a button or the like.User output devices 730 include all possible types of devices and mechanisms to output information fromcomputer 702. These may include a display (e.g., monitor 706), printers, non-visual displays such as audio output devices, etc. - Communications interface 750 provides an interface to other communication networks and devices and may serve as an interface to receive data from and transmit data to other systems, WANs and/or the
Internet 618. Embodiments ofcommunications interface 750 typically include an Ethernet card, a modem (telephone, satellite, cable, ISDN), a (asynchronous) digital subscriber line (DSL) unit, a FireWire® interface, a USB®, interface, a wireless network adapter, and the like. For example,communications interface 750 may be coupled to a computer network, to a FireWire® bus, or the like. In other embodiments,communications interface 750 may be physically integrated on the motherboard ofcomputer 702, and/or may be a software program, or the like. -
RAM 770 andnon-transitory storage drive 780 are examples of tangible computer-readable media configured to store data such as computer-program product embodiments of the present invention, including executable computer code, human-readable code, or the like. Other types of tangible computer-readable media include floppy disks, removable hard disks, optical storage media such as CD-ROMs, DVDs, bar codes, semiconductor memories such as flash memories, read-only-memories (ROMs), battery-backed volatile memories, networked storage devices, and the like.RAM 770 andnon-transitory storage drive 780 may be configured to store the basic programming and data constructs that provide the functionality of various embodiments of the present invention, as described above. - Software instruction sets that provide the functionality of the present invention may be stored in
RAM 770 andnon-transitory storage drive 780. These instruction sets or code may be executed by the processor(s) 760.RAM 770 andnon-transitory storage drive 780 may also provide a repository to store data and data structures used in accordance with the present invention.RAM 770 andnon-transitory storage drive 780 may include a number of memories including a main random access memory (RAM) to store instructions and data during program execution and a read-only memory (ROM) in which fixed instructions are stored.RAM 770 andnon-transitory storage drive 780 may include a file storage subsystem providing persistent (non-transitory) storage of program and/or data files.RAM 770 andnon-transitory storage drive 780 may also include removable storage systems, such as removable flash memory. -
Bus subsystem 790 provides a mechanism to allow the various components and subsystems ofcomputer 702 to communicate with each other as intended. Althoughbus subsystem 790 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple busses or communication paths within thecomputer 702. - Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a swim diagram, a data flow diagram, a structure diagram, or a block diagram. Although a depiction may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
- Furthermore, embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages, and/or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
- For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory. Memory may be implemented within the processor or external to the processor. As used herein the term “memory” refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
- Moreover, as disclosed herein, the term “storage medium” may represent one or more memories for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term “machine-readable medium” includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels, and/or various other storage mediums capable of storing that contain or carry instruction(s) and/or data.
- While the principles of the disclosure have been described above in connection with specific apparatuses and methods, it is to be clearly understood that this description is made only by way of example and not as limitation on the scope of the disclosure.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/508,183 US10089842B2 (en) | 2013-10-07 | 2014-10-07 | Smart-home security system with keypad device resistant to anomalous treatment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361887963P | 2013-10-07 | 2013-10-07 | |
US14/508,183 US10089842B2 (en) | 2013-10-07 | 2014-10-07 | Smart-home security system with keypad device resistant to anomalous treatment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150097958A1 true US20150097958A1 (en) | 2015-04-09 |
US10089842B2 US10089842B2 (en) | 2018-10-02 |
Family
ID=52776647
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/508,167 Active 2036-06-03 US9881470B2 (en) | 2013-10-07 | 2014-10-07 | Automated crowdsourced power outage identification and staggering of HVAC system restarts |
US14/508,183 Active 2036-12-28 US10089842B2 (en) | 2013-10-07 | 2014-10-07 | Smart-home security system with keypad device resistant to anomalous treatment |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/508,167 Active 2036-06-03 US9881470B2 (en) | 2013-10-07 | 2014-10-07 | Automated crowdsourced power outage identification and staggering of HVAC system restarts |
Country Status (3)
Country | Link |
---|---|
US (2) | US9881470B2 (en) |
CA (1) | CA2926423C (en) |
WO (1) | WO2015054272A2 (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105911873A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Self-learning intelligent household platform with sleep mode control |
CN105911874A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Intelligent home platform with traveling scene control function |
CN105911877A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Smart home system with going-out scene control |
CN105911875A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Smart home platform |
CN105911876A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Self-learning intelligent housing system with going-out scene control |
CN105915421A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Smart home platform with travel mode control function |
CN105911878A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Self-learning smart home system with sleeping mode control |
US20160255480A1 (en) * | 2015-02-26 | 2016-09-01 | Sony Corporation | Unified notification and response system |
CN105938326A (en) * | 2016-05-31 | 2016-09-14 | 南昌理工学院 | Intelligent household system |
CN105955056A (en) * | 2016-06-27 | 2016-09-21 | 韦庆克 | Intelligent household platform with sleep mode control |
CN105955055A (en) * | 2016-06-27 | 2016-09-21 | 韦庆克 | Self-learning intelligent household platform |
CN106054639A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Self-learning intelligent household platform with traveling mode control |
CN106054638A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Self-learning intelligent household system with traveling mode control |
CN106054640A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Intelligent household system with sleep mode control |
CN106054637A (en) * | 2016-06-27 | 2016-10-26 | 谢骞 | Self-learning intelligent household platform with out-going scene control |
FR3042363A1 (en) * | 2015-10-07 | 2017-04-14 | Groupe Brandt | HOUSEHOLD APPLIANCE AND COMMUNICATION METHOD BETWEEN THE HOUSEHOLD APPLIANCE AND A SERVER |
US20170279930A1 (en) * | 2016-03-28 | 2017-09-28 | Lenovo (Beijing) Limited | Network device and information processing method |
WO2018015849A1 (en) * | 2016-07-18 | 2018-01-25 | Cefla Societa' Cooperativa | Method and apparatus for setting indoor environmental conditions |
CN107733748A (en) * | 2017-09-06 | 2018-02-23 | 王建龙 | Virtual scene sharing method, virtual scene construction method and UE equipment |
GB2553798A (en) * | 2016-09-14 | 2018-03-21 | Lightfi Ltd | Automation system |
CN108919663A (en) * | 2018-07-25 | 2018-11-30 | 珠海格力电器股份有限公司 | A kind of management method and electronic equipment of smart home device |
US20190104472A1 (en) * | 2016-03-30 | 2019-04-04 | Sagemcom Energy & Telecom Sas | Method for activating a connected object |
US20190206207A1 (en) * | 2016-09-09 | 2019-07-04 | Atf Services Pty Ltd | Monitoring device |
US20190246074A1 (en) * | 2018-02-05 | 2019-08-08 | Honda Motor Co., Ltd. | High temperature video camera system |
FR3087598A1 (en) * | 2018-10-19 | 2020-04-24 | Legrand France | MAIN MODULE AND AUXILIARY MODULE FOR FORMING A SCALABLE CONNECTED PRODUCT |
USD886656S1 (en) * | 2018-11-06 | 2020-06-09 | Frontpoint Security Solutions, LLC | Keypad for a security system |
US11156020B2 (en) * | 2018-05-29 | 2021-10-26 | Spectrum Brands, Inc. | Tamper alarm for electronic lock |
US11493894B2 (en) | 2019-01-30 | 2022-11-08 | LightFi Limited | Automation system |
Families Citing this family (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10097240B2 (en) | 2013-02-19 | 2018-10-09 | Astrolink International, Llc | System and method for inferring schematic and topological properties of an electrical distribution grid |
AU2014277983B2 (en) | 2013-06-13 | 2018-07-05 | Dominion Energy Technologies, Inc. | Non-technical losses in a power distribution grid |
WO2015178810A1 (en) * | 2014-05-21 | 2015-11-26 | Telefonaktiebolaget L M Ericsson (Publ) | Managing effects of a scheduled outage of mains power |
US10039174B2 (en) | 2014-08-11 | 2018-07-31 | RAB Lighting Inc. | Systems and methods for acknowledging broadcast messages in a wireless lighting control network |
US10085328B2 (en) | 2014-08-11 | 2018-09-25 | RAB Lighting Inc. | Wireless lighting control systems and methods |
US10531545B2 (en) | 2014-08-11 | 2020-01-07 | RAB Lighting Inc. | Commissioning a configurable user control device for a lighting control system |
US9883567B2 (en) | 2014-08-11 | 2018-01-30 | RAB Lighting Inc. | Device indication and commissioning for a lighting control system |
US9722699B2 (en) * | 2014-11-20 | 2017-08-01 | Cable Television Laboratories, Inc. | Systems and methods for managing power at an optical network terminal |
FR3029336A1 (en) * | 2014-11-28 | 2016-06-03 | Orange | METHOD OF QUALIFYING ALERT AMONG ALERTS OBTAINED FROM AN ACTIVITY SUPERVISION SYSTEM |
US9870696B2 (en) * | 2015-01-05 | 2018-01-16 | Ford Global Technologies, Llc | Smart device vehicle integration |
US10677484B2 (en) | 2015-05-04 | 2020-06-09 | Johnson Controls Technology Company | User control device and multi-function home control system |
AU2016258911A1 (en) | 2015-05-04 | 2017-12-07 | Johnson Controls Technology Company | Mountable touch thermostat using transparent screen technology |
US10907844B2 (en) | 2015-05-04 | 2021-02-02 | Johnson Controls Technology Company | Multi-function home control system with control system hub and remote sensors |
US9953516B2 (en) | 2015-05-20 | 2018-04-24 | Google Llc | Systems and methods for self-administering a sound test |
WO2016186791A1 (en) * | 2015-05-20 | 2016-11-24 | Google Inc. | Systems and methods for testing smart home devices |
US10078959B2 (en) | 2015-05-20 | 2018-09-18 | Google Llc | Systems and methods for testing hazard detectors in a smart home |
US9454893B1 (en) | 2015-05-20 | 2016-09-27 | Google Inc. | Systems and methods for coordinating and administering self tests of smart home devices having audible outputs |
US9781686B2 (en) | 2015-07-23 | 2017-10-03 | Google Inc. | Reducing wireless communication to conserve energy and increase security |
JP6772248B2 (en) | 2015-08-07 | 2020-10-21 | シグニファイ ホールディング ビー ヴィSignify Holding B.V. | Determining the state of network devices |
US10410300B2 (en) | 2015-09-11 | 2019-09-10 | Johnson Controls Technology Company | Thermostat with occupancy detection based on social media event data |
US10760809B2 (en) | 2015-09-11 | 2020-09-01 | Johnson Controls Technology Company | Thermostat with mode settings for multiple zones |
EP3356354A1 (en) | 2015-09-28 | 2018-08-08 | Araxes Pharma LLC | Inhibitors of kras g12c mutant proteins |
US10002504B2 (en) * | 2015-10-01 | 2018-06-19 | Honeywell International Inc. | System and method of providing intelligent system trouble notifications using localization |
US11277893B2 (en) | 2015-10-28 | 2022-03-15 | Johnson Controls Technology Company | Thermostat with area light system and occupancy sensor |
CN105373720B (en) * | 2015-10-28 | 2018-04-20 | 广东欧珀移动通信有限公司 | A kind of module control method and device applied to mobile terminal |
US10180673B2 (en) | 2015-10-28 | 2019-01-15 | Johnson Controls Technology Company | Multi-function thermostat with emergency direction features |
US10655881B2 (en) | 2015-10-28 | 2020-05-19 | Johnson Controls Technology Company | Thermostat with halo light system and emergency directions |
US10546472B2 (en) | 2015-10-28 | 2020-01-28 | Johnson Controls Technology Company | Thermostat with direction handoff features |
US10318266B2 (en) | 2015-11-25 | 2019-06-11 | Johnson Controls Technology Company | Modular multi-function thermostat |
US10831940B2 (en) * | 2015-12-23 | 2020-11-10 | Gas Technology Institute | Utility situational awareness system |
US10205628B2 (en) * | 2016-06-07 | 2019-02-12 | Time Warner Cable Enterprises Llc | Methods and apparatus for determining and/or controlling backup power in a communications system |
CN109313738A (en) * | 2016-06-13 | 2019-02-05 | 鹰图公司 | The system and method that maintenance shared device is accelerated in electronics dialogue are carried out using with people |
US10566835B2 (en) * | 2016-07-22 | 2020-02-18 | International Business Machines Corporation | Detecting power outages using smartphone sensors |
US11209181B2 (en) * | 2016-07-27 | 2021-12-28 | Johnson Controls Technology Company | Heating, ventilating, and air conditioning system override systems and methods |
US10941951B2 (en) | 2016-07-27 | 2021-03-09 | Johnson Controls Technology Company | Systems and methods for temperature and humidity control |
US10574618B1 (en) * | 2016-09-19 | 2020-02-25 | Amazon Technologies, Inc. | Processing client devices |
US10341178B1 (en) | 2016-09-19 | 2019-07-02 | Amazon Technologies, Inc. | Configuring client devices |
US11012461B2 (en) * | 2016-10-27 | 2021-05-18 | Accenture Global Solutions Limited | Network device vulnerability prediction |
US10253995B1 (en) | 2017-01-31 | 2019-04-09 | State Farm Mutual Automobile Insurance Company | Systems and methods for mitigating smoke damage to a property |
US10458669B2 (en) | 2017-03-29 | 2019-10-29 | Johnson Controls Technology Company | Thermostat with interactive installation features |
US10712038B2 (en) | 2017-04-14 | 2020-07-14 | Johnson Controls Technology Company | Multi-function thermostat with air quality display |
WO2018191688A2 (en) | 2017-04-14 | 2018-10-18 | Johnson Controls Techology Company | Thermostat with exhaust fan control for air quality and humidity control |
US9986509B1 (en) * | 2017-04-21 | 2018-05-29 | Cisco Technology, Inc. | Advance remote failure notification (ARFN) |
US10715886B2 (en) | 2017-06-06 | 2020-07-14 | Landis+Gyr Technologies, Llc | Power outage-assessment apparatuses and methods |
US10379934B2 (en) * | 2017-07-31 | 2019-08-13 | Oracle International Corporation | System and method of providing post error analysis for instances of applications in cloud service environments on a per user basis |
BR112020008325A2 (en) | 2017-11-14 | 2020-10-20 | Pfizer Inc. | combination therapies with the ezh2 inhibitor |
US11175716B2 (en) * | 2017-11-17 | 2021-11-16 | International Business Machines Corporation | Mid-cycle electricity outage monitoring system |
US11188897B2 (en) | 2018-02-13 | 2021-11-30 | Bank Of America Corporation | Multi-tiered digital wallet security |
US11131474B2 (en) | 2018-03-09 | 2021-09-28 | Johnson Controls Tyco IP Holdings LLP | Thermostat with user interface features |
CN109188930A (en) * | 2018-11-01 | 2019-01-11 | 杭州鸿雁电器有限公司 | A kind of cooperative control method based on building electric apparatus |
US11107390B2 (en) | 2018-12-21 | 2021-08-31 | Johnson Controls Technology Company | Display device with halo |
US20210028648A1 (en) * | 2019-04-11 | 2021-01-28 | Johnson Controls Technology Company | Systems and methods for monitoring and controlling outlet power |
CN113630297B (en) * | 2019-07-26 | 2023-05-12 | 华为技术有限公司 | Method and terminal for controlling first equipment |
US11537703B2 (en) * | 2019-10-11 | 2022-12-27 | Moon River Investments, Llc | GFI tripped circuit detection and wireless notification systems and methods |
US11932080B2 (en) | 2020-08-20 | 2024-03-19 | Denso International America, Inc. | Diagnostic and recirculation control systems and methods |
US11636870B2 (en) | 2020-08-20 | 2023-04-25 | Denso International America, Inc. | Smoking cessation systems and methods |
US11760170B2 (en) | 2020-08-20 | 2023-09-19 | Denso International America, Inc. | Olfaction sensor preservation systems and methods |
US11828210B2 (en) | 2020-08-20 | 2023-11-28 | Denso International America, Inc. | Diagnostic systems and methods of vehicles using olfaction |
US11760169B2 (en) | 2020-08-20 | 2023-09-19 | Denso International America, Inc. | Particulate control systems and methods for olfaction sensors |
US11813926B2 (en) | 2020-08-20 | 2023-11-14 | Denso International America, Inc. | Binding agent and olfaction sensor |
US11881093B2 (en) | 2020-08-20 | 2024-01-23 | Denso International America, Inc. | Systems and methods for identifying smoking in vehicles |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6122163A (en) * | 1998-07-27 | 2000-09-19 | Compaq Computer Corporation | Security mounting structure for electronic apparatus component |
US6127926A (en) * | 1995-06-22 | 2000-10-03 | Dando; David John | Intrusion sensing systems |
US20050195972A1 (en) * | 2002-03-14 | 2005-09-08 | Craig Barr | Decorative concealed audio-visual interface apparatus and method |
US20060055534A1 (en) * | 2004-09-09 | 2006-03-16 | Fergusson Robert T | Digital capacitive sensing device for security and safety applications |
US20060187024A1 (en) * | 2005-02-08 | 2006-08-24 | Kouros Azimi | Portable security system |
US20070063841A1 (en) * | 2005-09-22 | 2007-03-22 | Honeywell International, Inc. | Cross-zone supervision for a security system |
US20080092230A1 (en) * | 2006-10-12 | 2008-04-17 | Addy Kenneth L | Method and system for controlling a security system using near field communication |
US20080191860A1 (en) * | 2004-04-30 | 2008-08-14 | Utc Fire & Security Corporation | Atm Security System |
US20090016308A1 (en) * | 2000-12-22 | 2009-01-15 | Terahop Networks, Inc. | Antenna in cargo container monitoring and security system |
US20090066652A1 (en) * | 2007-09-10 | 2009-03-12 | Verstraelen J G R | Keypad for a security system |
US20090167488A1 (en) * | 2007-12-31 | 2009-07-02 | Jonathan Gordon Hays | Gps enabled key management system |
US20100033329A1 (en) * | 2008-08-08 | 2010-02-11 | Xitel Pty. Ltd. | Portable Security Container with Movement Detection System |
US20100265069A1 (en) * | 2007-01-19 | 2010-10-21 | Georgia Tech Research Corporation | Determining enclosure breach electromechanically |
US20110121967A1 (en) * | 2006-04-21 | 2011-05-26 | Honeywell International Inc. | Tamper-proof security system component |
US20110302078A1 (en) * | 2010-06-02 | 2011-12-08 | Bryan Marc Failing | Managing an energy transfer between a vehicle and an energy transfer system |
US20120286951A1 (en) * | 2011-05-13 | 2012-11-15 | Hess Brian K | Consumer alarm with quiet button |
US20130015974A1 (en) * | 2011-07-13 | 2013-01-17 | Durwin Keith Lasker | Debo alarm system (D.A.S.) |
US20130207802A1 (en) * | 2010-11-05 | 2013-08-15 | Tyco Safety Products Canada Ltd. | Alarm system providing tamper deterrent signalling and method |
US20130321150A1 (en) * | 2011-05-31 | 2013-12-05 | Darren A. Koenig | System and Method for Alarm System Tamper Detection and Reporting |
US20140266669A1 (en) * | 2013-03-14 | 2014-09-18 | Nest Labs, Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH629905A5 (en) | 1978-07-17 | 1982-05-14 | Cerberus Ag | GAS AND / OR FIRE DETECTING SYSTEM. |
US4254414A (en) | 1979-03-22 | 1981-03-03 | The United States Of America As Represented By The Secretary Of The Navy | Processor-aided fire detector |
US4313110A (en) | 1980-02-19 | 1982-01-26 | Thomas Subulak | Smoke alarm having temporary disabling features |
JPH04257674A (en) * | 1991-02-06 | 1992-09-11 | Sanyo Electric Co Ltd | Controlling device for refrigerator |
US5572438A (en) * | 1995-01-05 | 1996-11-05 | Teco Energy Management Services | Engery management and building automation system |
US6643566B1 (en) | 1999-01-12 | 2003-11-04 | Powerdsine Ltd. | System for power delivery over data communication cabling infrastructure |
US6119469A (en) * | 1999-06-14 | 2000-09-19 | Spx Corporation | Programmable electronic start-up delay for refrigeration units |
US6980091B2 (en) | 2002-12-10 | 2005-12-27 | Current Technologies, Llc | Power line communication system and method of operating the same |
US7246514B2 (en) | 2004-10-29 | 2007-07-24 | Honeywell International, Inc. | Method for verifying sensors installation and determining the location of the sensors after installation in a structural health management system |
US7987110B2 (en) | 2007-07-25 | 2011-07-26 | International Business Machines Corporation | Managing organizational resources |
EP2096610A1 (en) | 2008-02-26 | 2009-09-02 | British Telecommunications Public Limited Company | Remote monitoring thresholds |
CA2691774C (en) | 2009-02-02 | 2014-11-18 | Alarmforce Industries Inc. | Security system with two-way communication and video |
US8977399B2 (en) | 2009-05-21 | 2015-03-10 | Lennox Industries Inc. | Staggered start-up HVAC system, a method for starting an HVAC unit and an HVAC controller configured for the same |
US10381869B2 (en) | 2010-10-29 | 2019-08-13 | Verizon Patent And Licensing Inc. | Remote power outage and restoration notification |
US8395501B2 (en) | 2010-11-23 | 2013-03-12 | Universal Security Instruments, Inc. | Dynamic alarm sensitivity adjustment and auto-calibrating smoke detection for reduced resource microprocessors |
US9007222B2 (en) | 2012-09-21 | 2015-04-14 | Google Inc. | Detector unit and sensing chamber therefor |
US8539567B1 (en) * | 2012-09-22 | 2013-09-17 | Nest Labs, Inc. | Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers |
-
2014
- 2014-10-07 WO PCT/US2014/059520 patent/WO2015054272A2/en active Application Filing
- 2014-10-07 CA CA2926423A patent/CA2926423C/en active Active
- 2014-10-07 US US14/508,167 patent/US9881470B2/en active Active
- 2014-10-07 US US14/508,183 patent/US10089842B2/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6127926A (en) * | 1995-06-22 | 2000-10-03 | Dando; David John | Intrusion sensing systems |
US6122163A (en) * | 1998-07-27 | 2000-09-19 | Compaq Computer Corporation | Security mounting structure for electronic apparatus component |
US20090016308A1 (en) * | 2000-12-22 | 2009-01-15 | Terahop Networks, Inc. | Antenna in cargo container monitoring and security system |
US20050195972A1 (en) * | 2002-03-14 | 2005-09-08 | Craig Barr | Decorative concealed audio-visual interface apparatus and method |
US20080191860A1 (en) * | 2004-04-30 | 2008-08-14 | Utc Fire & Security Corporation | Atm Security System |
US20060055534A1 (en) * | 2004-09-09 | 2006-03-16 | Fergusson Robert T | Digital capacitive sensing device for security and safety applications |
US20060187024A1 (en) * | 2005-02-08 | 2006-08-24 | Kouros Azimi | Portable security system |
US20070063841A1 (en) * | 2005-09-22 | 2007-03-22 | Honeywell International, Inc. | Cross-zone supervision for a security system |
US20110121967A1 (en) * | 2006-04-21 | 2011-05-26 | Honeywell International Inc. | Tamper-proof security system component |
US20080092230A1 (en) * | 2006-10-12 | 2008-04-17 | Addy Kenneth L | Method and system for controlling a security system using near field communication |
US20100265069A1 (en) * | 2007-01-19 | 2010-10-21 | Georgia Tech Research Corporation | Determining enclosure breach electromechanically |
US20090066652A1 (en) * | 2007-09-10 | 2009-03-12 | Verstraelen J G R | Keypad for a security system |
US20090167488A1 (en) * | 2007-12-31 | 2009-07-02 | Jonathan Gordon Hays | Gps enabled key management system |
US20100033329A1 (en) * | 2008-08-08 | 2010-02-11 | Xitel Pty. Ltd. | Portable Security Container with Movement Detection System |
US20110302078A1 (en) * | 2010-06-02 | 2011-12-08 | Bryan Marc Failing | Managing an energy transfer between a vehicle and an energy transfer system |
US20130207802A1 (en) * | 2010-11-05 | 2013-08-15 | Tyco Safety Products Canada Ltd. | Alarm system providing tamper deterrent signalling and method |
US20120286951A1 (en) * | 2011-05-13 | 2012-11-15 | Hess Brian K | Consumer alarm with quiet button |
US20130321150A1 (en) * | 2011-05-31 | 2013-12-05 | Darren A. Koenig | System and Method for Alarm System Tamper Detection and Reporting |
US20130015974A1 (en) * | 2011-07-13 | 2013-01-17 | Durwin Keith Lasker | Debo alarm system (D.A.S.) |
US20140266669A1 (en) * | 2013-03-14 | 2014-09-18 | Nest Labs, Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160255480A1 (en) * | 2015-02-26 | 2016-09-01 | Sony Corporation | Unified notification and response system |
US9693207B2 (en) * | 2015-02-26 | 2017-06-27 | Sony Corporation | Unified notification and response system |
FR3042363A1 (en) * | 2015-10-07 | 2017-04-14 | Groupe Brandt | HOUSEHOLD APPLIANCE AND COMMUNICATION METHOD BETWEEN THE HOUSEHOLD APPLIANCE AND A SERVER |
US10855811B2 (en) * | 2016-03-28 | 2020-12-01 | Lenovo (Beijing) Limited | Network device and information processing method |
US20170279930A1 (en) * | 2016-03-28 | 2017-09-28 | Lenovo (Beijing) Limited | Network device and information processing method |
US10716065B2 (en) * | 2016-03-30 | 2020-07-14 | Sagemcom Energy & Telecom Sas | Method for activating a connected object |
US20190104472A1 (en) * | 2016-03-30 | 2019-04-04 | Sagemcom Energy & Telecom Sas | Method for activating a connected object |
CN105938326A (en) * | 2016-05-31 | 2016-09-14 | 南昌理工学院 | Intelligent household system |
CN106054637A (en) * | 2016-06-27 | 2016-10-26 | 谢骞 | Self-learning intelligent household platform with out-going scene control |
CN105911875A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Smart home platform |
CN105955055A (en) * | 2016-06-27 | 2016-09-21 | 韦庆克 | Self-learning intelligent household platform |
CN106054639A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Self-learning intelligent household platform with traveling mode control |
CN106054638A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Self-learning intelligent household system with traveling mode control |
CN106054640A (en) * | 2016-06-27 | 2016-10-26 | 韦庆克 | Intelligent household system with sleep mode control |
CN105955056A (en) * | 2016-06-27 | 2016-09-21 | 韦庆克 | Intelligent household platform with sleep mode control |
CN105911878A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Self-learning smart home system with sleeping mode control |
CN105911873A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Self-learning intelligent household platform with sleep mode control |
CN105911876A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Self-learning intelligent housing system with going-out scene control |
CN105915421A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Smart home platform with travel mode control function |
CN105911874A (en) * | 2016-06-27 | 2016-08-31 | 谢骞 | Intelligent home platform with traveling scene control function |
CN105911877A (en) * | 2016-06-27 | 2016-08-31 | 韦庆克 | Smart home system with going-out scene control |
WO2018015849A1 (en) * | 2016-07-18 | 2018-01-25 | Cefla Societa' Cooperativa | Method and apparatus for setting indoor environmental conditions |
US10650649B2 (en) * | 2016-09-09 | 2020-05-12 | ATF Services Pty Ltd. | Monitoring device |
US20190206207A1 (en) * | 2016-09-09 | 2019-07-04 | Atf Services Pty Ltd | Monitoring device |
GB2553798A (en) * | 2016-09-14 | 2018-03-21 | Lightfi Ltd | Automation system |
GB2553798B (en) * | 2016-09-14 | 2020-12-16 | Lightfi Ltd | Automation system |
US11334038B2 (en) | 2016-09-14 | 2022-05-17 | LightFi Limited | Automation system |
CN107733748A (en) * | 2017-09-06 | 2018-02-23 | 王建龙 | Virtual scene sharing method, virtual scene construction method and UE equipment |
US20190246074A1 (en) * | 2018-02-05 | 2019-08-08 | Honda Motor Co., Ltd. | High temperature video camera system |
US11156020B2 (en) * | 2018-05-29 | 2021-10-26 | Spectrum Brands, Inc. | Tamper alarm for electronic lock |
US11898371B2 (en) | 2018-05-29 | 2024-02-13 | Assa Abloy Americas Residential Inc. | Tamper alarm for electronic lock |
CN108919663A (en) * | 2018-07-25 | 2018-11-30 | 珠海格力电器股份有限公司 | A kind of management method and electronic equipment of smart home device |
FR3087598A1 (en) * | 2018-10-19 | 2020-04-24 | Legrand France | MAIN MODULE AND AUXILIARY MODULE FOR FORMING A SCALABLE CONNECTED PRODUCT |
USD886656S1 (en) * | 2018-11-06 | 2020-06-09 | Frontpoint Security Solutions, LLC | Keypad for a security system |
US11493894B2 (en) | 2019-01-30 | 2022-11-08 | LightFi Limited | Automation system |
Also Published As
Publication number | Publication date |
---|---|
US10089842B2 (en) | 2018-10-02 |
US20150100166A1 (en) | 2015-04-09 |
WO2015054272A2 (en) | 2015-04-16 |
US9881470B2 (en) | 2018-01-30 |
CA2926423C (en) | 2022-05-24 |
WO2015054272A3 (en) | 2015-06-25 |
CA2926423A1 (en) | 2015-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10089842B2 (en) | Smart-home security system with keypad device resistant to anomalous treatment | |
US10192426B2 (en) | Systems and methods of privacy within a security system | |
US11508233B2 (en) | Handling duress input | |
US10262507B2 (en) | Smart-home hazard detection system providing context-based user notifications | |
US10290191B2 (en) | Alarm arming with open entry point | |
US10127785B2 (en) | Entry point opening sensor | |
US11100786B2 (en) | Sensor bypass | |
US10429177B2 (en) | Blocked sensor detection and notification | |
US20160189527A1 (en) | Intelligent Object-Based Alarm System | |
US20150194040A1 (en) | Intelligent motion sensor | |
US10346600B2 (en) | Interface of an automation system | |
US20190378399A1 (en) | Security System | |
US20220270470A1 (en) | Security / automation system control panel with short range communication disarming |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HONJO, SHIGEFUMI;MATSUOKA, YOKY;PETERSON, KEVIN;AND OTHERS;SIGNING DATES FROM 20141030 TO 20141216;REEL/FRAME:034549/0458 |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044129/0001 Effective date: 20170929 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |